A Sensornet Testbed at the University of Warsaw

Size: px
Start display at page:

Download "A Sensornet Testbed at the University of Warsaw"

Transcription

1 A Sensornet Testbed at the University of Warsaw Mateusz Michalowski, Przemyslaw Horban, Karol Strzelecki, Jacek Migdal, Maciej Klimek, Piotr Glazar, and Konrad Iwanicki University of Warsaw, Poland {mm262512, ph26294, ks249241, jm262954, mk277539, Technical Report TR-DS-1/12 University of Warsaw, July 212 ABSTRACT We present a wireless sensor network (sensornet) testbed for routing protocols, which we have deployed at the University of Warsaw. The testbed consists of 1+-sensor nodes dispersed across ten office rooms and supported by additional infrastructure. As we demonstrate through microbenchmarks and experiments with the Collection Tree Protocol (CTP), the testbed constitutes a challenging environment for routing protocols. First, it has a large diameter: from six to nine hops, depending on the radio output power. Second, it offers a highly nonuniform node density: from a few to nearly fifty neighbors. Third, it exhibits a large fraction of asymmetric links. Faculty of Mathematics, Informatics and Mechanics University of Warsaw ul. Banacha Warszawa Poland

2 2 M. Michalowski et al. Contents 1 Introduction 3 2 Architecture Nodes Localization Infrastructure General Properties Link grades Network connectivity Packet reception rate Physical quality indicators Distribution of link qualities Diameter Neighborhood size Link asymmetry Collection Routing Experimental settings Experimental metrics Experimental results Conclusion 12 Acknowledgment 12 References 12

3 A Sensornet Testbed at the University of Warsaw 3 1 Introduction In this technical report, we introduce a 1+-node wireless sensor network (sensornet) testbed that we have built at the University of Warsaw. The testbed is designed to be a conclusive and challenging environment for experiments with routing protocols. More specifically, it emphasizes the following three features: experiment monitoring. Moreover, as a node is powered from the USB connection, no regular battery replacements are necessary. Large diameter The larger the number of hops that a routing protocol has to perform to deliver a packet between nodes, the more work there is for the protocol. Nonuniform density The larger the differences in the number of neighbors between different nodes, the more challenging it is for a routing protocol to maintain local routing state at each node. Asymmetric links The more asymmetric wireless links are, the more difficult it is for a routing protocol to provide reliable routing paths. We present the physical organization, as well as the hardware and software of the testbed. We also experimentally validate how the testbed fulfills the three aforementioned design objectives. More specifically, we show that (1) depending on the radio output power, the diameter of the testbed is from six to nine hops, (2) a node can have from a few to nearly fifty neighbors, and (3) more than 15% of links are asymmetric. Overall, the testbed indeed constitutes a challenging platform for sensornet routing protocols. The rest of the report is organized as follows. Section 2 starts with presenting the architecture of the testbed. Section 3 studies the aforementioned connectivity properties of the testbed through microbenchmark experiments. Section 4 presents the performance of a complete all-to-one routing protocol, Collection Tree Protocol (CTP). Finally, Section 5 concludes. More detailed information on the testbed can be found in [8]. 2 Architecture The testbed consists of 12 permanent wireless sensor nodes located in ten office rooms and supported by and additional wired hardware-software infrastructure. 2.1 Nodes The nodes belong to the SOWNet Technologies G-Node G31 family [9] (see Fig. 1 and Table 1). Each comes with a USB interface that can be used for programming, debugging and data logging. This simplifies reprogramming, and minimizes the disruption to wireless communication during Fig. 1. G-Node G31 (housing disassembled) Microcontroller family Radio chip CPU speed RAM size ROM size Radio band Radio throughput Indoor radio range Outdoor radio range Dimensions TI MSP43 TI CC MHz 8KB 116KB 868MHz 25kbit/s 1 2m 3m 6 x 6 x 19mm Table 1. Selected G-Node G31 parameters G31 supports TinyOS 2.1 [7], which provides an abstraction layer over node hardware components. Applications running on the nodes can be written in the nesc programming language [2]. As a result, a programmer can focus on the implementation of a routing protocol and, to some extent, ignore hardware-specific aspects. 2.2 Localization The testbed is located on the third floor of the north wing of the Mathematics, Informatics and Mechanics faculty building (see Fig. 2). The nodes are distributed among ten rooms on both sides of the corridor. In each room, there are from 8 to 11 nodes, the most of which are hidden away from humans. Not only does this approach minimize the nodes negative aesthetic impact, but also reduces the risk of accidentally damaging the installation. Despite being hidden, the node locations are still diverse: the nodes are installed at different heights, on various surfaces (e.g., wood, carpet, concrete, stone), and with different distances and orientations with respect to each other.

4 4 M. Michalowski et al. Fig. 2. Node placement 2.3 Infrastructure To make use of the USB interface of G31, additional hardware is installed in each room. The central point of each room s infrastructure is an Asus EeeBox EB121 mini PC, to which sensor nodes are connected via USB. We decided to use one mini PC per room, considering both the price of EB121 and the limitations of USB topologies. For external communication, mini PCs are connected to a LAN. Each mini PC is responsible for programming the connected nodes, monitoring their status, and providing wired bidirectional communication. To keep control over the 1 mini PCs and 12 nodes dispersed across the building, a dedicated management platform has been developed and deployed on a separate powerful Linux server. In this report, we omit the details of the platform for brevity. For more information, please, refer to [8]. 3 General Properties We evaluate basic connectivity properties of the testbed with a simple TinyOS application, which we developed for our previous testbed, KonTest [5]. In short, at a random moment in every minute, each node running the application broadcasts a 4-byte radio packet. Likewise, upon reception of a similar packet from another node, the receiver logs the packet s metadata, such as a sequence number, received signal strength indicator (RSSI), and link quality indicator (LQI). Based on the metadata logged by all nodes, we compute packet reception ratios (the fraction of successfully delivered packets) for wireless links, and correlate these values with the physical signal quality indicators: RSSI and LQI. The link qualities measured in this way should reflect the actual link qualities well, because the long (oneminute) inter-packet intervals essentially eliminate packet collisions. We ran the application on all 12 nodes with 5 different radio output power levels (i.e., 12dBm, 1dBm, 7dBm, 5dBm, dbm). For any given power level, the run took at least a few days to deliver long-term link quality information and to maximize our confidence in the results. 3.1 Link grades In subsequent sections, we use so-called link grades to classify the quality (measured as packet reception rate) of wireless links between nodes (see Table 2). Note that link quality normally refers to a one-way link from a sender to a receiver (so-called unidirectional link quality). However, in real applications a packet sent by a node is often required to be acknowledged by the receiver. Therefore, it reasonable to also introduce so-called bidirectional link quality. We define the bidirectional quality of a link as a product of unidirectional qualities of the link in both directions. Grade Range Description A (.9, 1] reliable uni-/bi-directional links B (.5,.9] utilizable uni-/bi-directional links C (,.5] poor uni-/bi-directional links R (.81, 1] reliable bidirectional routing links Table 2. Link grades 3.2 Network connectivity Packet reception rate To illustrate the quality of radio links between each pair of nodes, Fig. 3, Fig. 4, and Fig. 5 depict connectivity maps for different radio output power levels. Each line in the figures represents the packet reception rate of a bidirectional link between two nodes. The darker is the line, the higher the packet reception rate it represents, and thus, the more reliable the corresponding link. In general for all analyzed radio power levels, the network is connected. However, for the power level of dbm,

5 A Sensornet Testbed at the University of Warsaw 5 Fig. 3. Connectivity map (dbm) Fig. 4. Connectivity map (7dBm) Fig. 5. Connectivity map (12dBm) a lack of network partitions is achievable only when allgrade links are considered. In contrast, when analyzing the connectivity graph induced only by A- and B-grade links, the graph appears to be split in two parts (with the line of the split located between rooms 431 and 428). The most of A-grade links, connect nodes located in the same room or in neighboring rooms. The power level of 7dBm is the lowest that offers a connected network based solely on bidirectional A-grade links. A lot of C-grade links that are available for the dbm power level become B- or even A-grade with the 7dBm power level. Moreover, a number of new C-grade links become available and connect more distant areas of the testbed. As an example, direct connectivity between rooms 436 and 423 is possible with a few C-grade links. The highest power level of 12dBm introduces a lot of new A-grade links between more distant room pairs like 436 and 428, while for the 7dBm these are connected mostly with B-grade links. However, the connections to room 41 are still available mostly from the closest room, 416. In general, although link qualities increase for higher radio power levels and lower inter-node distances, there are some exceptions from this rule, especially when C-grade links are considered. For example, a few C-grade links between rooms 423 and 41 disappear after increasing the power level: the power level of 1dBm offers 7 such links, but for the highest power level, 6 of those links no longer exist. Likewise, obstacles, such as walls and furniture, influence link quality. This is especially visible when considering the dbm case (see Fig. 3). As an example, the

6 6 M. Michalowski et al Sender node Recipient node Fig. 6. Reception rate in 1-room experiment (7dBm) right bottom corner of room 428 in the figure corresponds to a thicker wall. The quality of the links around this spot is significantly higher than that of the links going directly through the spot. Links between rooms 41 and 416 also illustrate the influence of obstacles. As there is mostly open space between these rooms, the links have noticeably higher quality than an average link over a similar distance. Finally, Fig. 6 visualizes the connectivity map for the radio power level of 7dBm (from Fig. 4) in the form of connectivity matrix. We can observe that radio links between nodes in one room are typically reliable and form cliques. In contrast, links between rooms seem more random. Essentially, the matrix indicates that the testbed fulfills the three design goals: it has a large diameter, nonuniform neighborhood sizes, and many asymmetric links. We confirm these properties further in this report Physical quality indicators As RSSI and LQI measure the quality of the received radio signal, we analyze their relevance in estimating link quality. Figure 7 illustrates for each link the correlation between the packet reception rate for the link and the RSSI values of packets received over the link. One point in the figure represents the RSSI of a single packet. In general, RSSI values are increasing for links with higher reception rates. RSSI values above -75dBm indicate a reliable link (with a high packet reception rate). In contrast, values below -85dBm give a strong suggestion that the link may not be stable. As the variance of RSSI is quite noticeable, the values in-between can be measured for links with many different reception rates. However, when a given link is considered, the variance of RSSI is relatively small. Overall, there is correlation between RSSI and packet reception rates that can be exploited by routing protocols, which is consistent with prior work [1]. Figure 8 depicts analogous results for the LQI metric. The figure shows that for higher reception rates, the average LQI values are decreasing slightly, which is consistent with the specification of the CC111 radio employed by G31 [9]. However, since the links with the lowest reception rates can display virtually any LQI, it is hardly possible

7 A Sensornet Testbed at the University of Warsaw dbm 5dbm 7dbm 25 1dbm 12dbm.9 Number of unidirectional links.8 Reception rate C = (,.5] B = (.5,.9] A = (.9,1] Link grade RSSI Fig. 7. RSSI correlated with packet reception rate Fig. 9. Distribution of unidirectional link qualities Reception rate LQI Fig. 8. LQI correlated with packet reception rate to estimate the reception rate based solely on LQI values. Therefore, at least in the case of G31, the LQI metric is less useful for identifying high-quality links for routing protocols than RSSI Distribution of link qualities For a routing protocol, not only the quality, but also the quantity of links is important. In particular, if high-quality links constitute a significant fraction of all links, it is easier for a routing protocol to identify them. The distribution of unidirectional link qualities (grouped into the aforementioned grades) is shown in Fig. 9. The figure illustrates that the link qualities have a bimodal-like distribution: most of the links fall into either the worst, C-grade category, or the best, A-grade category; in contrast, there are few B-grade links. Furthermore, although increasing the radio output power usually increases the total number of links, there are exceptions from this rule. First, when comparing the dbm case with the 5dBm case, one can observe that the link grade distribution changes noticeably. However, the overall number of links in the network remains almost the same. Analyzing connectivity maps for these output powers, we can notice that although some links increase their grade at 5dBm, hardly any new links are introduced, as the stronger signal is still too weak to reach extra nodes at higher distances. In effect, the number of A-grade links increases significantly, but the overall link count remains almost unchanged. Second, the overall link count drops by almost 8 when comparing the 12dBm radio output power to the 1dBm power. More specifically, there are almost 7 fewer Cgrade links and about 3 fewer B-grade links, while, at the same time, the number of A-grade links increases by only about 2. This phenomenon may be caused by multi-path effects affecting low-quality links. An analogous distribution of bidirectional link grades is presented in Fig. 1. It is similar to the unidirectional one. What is worth noticing, though, is the fact that the total number of bidirectional links is lower than the half of the unidirectional links. This difference is caused by link asymmetry: a nonexistent unidirectional link precludes the existence of the corresponding bidirectional link, even if the link in the reverse direction has a high quality. 3.3 Diameter Having discussed the basic connectivity properties of the testbed, let us proceed to assessing how the testbed fulfills the three design goals we formulated initially. Our first goal was a large diameter, measured as the maximal number of hops a packet has to take to reach its destination node over a shortest path. A large diameter stresses a routing protocol in many aspects: the amount of state maintained by each node,

8 8 M. Michalowski et al. Number of bidirectional links dbm 5dbm 7dbm 1dbm 12dbm C = (,.5] B = (.5,.9] A = (.9,1] R = (.81,1] Link grade Fig. 1. Distribution of bidirectional link qualities the dilation of routing paths, and the latency of reacting to changes in the network, to name just a few examples [6]. Figure 11) presents how many hops are necessary to deliver a packet between each pair of nodes over A-gradeonly unidirectional (outgoing) links. Node pairs [%] dbm 5dbm 7dbm 1dbm 12dbm a node pair is 2 hops. Importantly, however, the maximal inter-node distance (the network diameter) is 6 hops for the two highest radio output power levels. Moreover, for lower power levels, the diameter further grows. For the 5dBm case, it is 7 hops, while for the power of dbm, it is as large as 9 hops. In other words, the diameter of the testbed is relatively large compared to other testbeds deployed to date [4]. Figure 12 illustrates analogous results for bidirectional R-grade links. For the radio power level of dbm, communication is not possible between almost 6% of node pairs. In contrast, for all higher power levels, communication is possible for all node pairs. Similarly to the unidirectional case, 2 hops is the the most common distance. The diameter, in turn, varies between 5 hops for the 12dBm radio power level, and 8 hops for the 5dBm power. To sum up, the testbed has indeed a relatively large diameter. Node pairs [%] No link Bidirectional R-grade link hops dbm 5dbm 7dbm 1dbm 12dbm Fig. 12. Routing paths over bidirectional R-grade links 5 No link Outgoing A-grade link hops Fig. 11. Routing paths over outgoing A-grade links For the dbm radio output power, no communication over A-grade-only links is possible for almost 25% of node pairs because of the low number of A-grade links at this power level. For the 5dBm power, this is no longer the case: all node pairs are able to communicate over A-grade links. However, when considering the power levels above 5dBm, again no communication is possible for about 1% of node pairs. This phenomenon is due to one node whose all outgoing links are graded below A at power levels greater than 5dBm. This again can likely be attributed to multi-path effects of radio signal. For all power levels, the most common distance between 3.4 Neighborhood size Many routing protocols require nodes to store information about high-quality links to other nodes in the radio range (neighbors). If the number of neighbors varies significantly between nodes, a routing protocol may have difficulties discriminating high-quality links from low-quality ones without significantly overprovisioning memory for neighbor entries. Moreover, retransmission strategies that improve packet delivery in dense areas may fail in sparser areas of the network, thereby degrading end-to-end packet delivery rates. For these reasons, nonuniform neighborhood size distribution was our second design goal for the testbed. Figure 13, Fig. 14, and Fig. 15 present the distribution of the number of neighbors for the 7dBm radio output power and outgoing, incoming, and bidirectional links, respectively. When outgoing neighbors are considered, it can be concluded that the results are concentrated around

9 A Sensornet Testbed at the University of Warsaw 9 an average value of 28 neighbors. The peak for the degree of 7 is achieved for nodes in room 41, which are slightly separated from the rest of the network. This phenomenon is less pronounced for the incoming neighbors, as the variation of the values is significantly higher than for the outgoing neighbors. In other words, there are areas of the testbed that are quite dense, with a few tens of neighbors per node, as well as areas that are extremely sparse, with just a few neighbors per node. Fraction of nodes [%] Fraction of nodes [%] Bidirectional R-grade neighbors Fig. 15. Bidirectional R-grade neighbor distribution Outgoing A-grade links Incoming A-grade links Bidirectional R-grade links Outgoing A-grade neighbors Fig. 13. Outgoing A-grade neighbor distribution Neighbors Power level [dbm] Fraction of nodes [%] Incoming A-grade neighbors Fig. 14. Incoming A-grade neighbor distribution Figure 17 shows that the situation does not change for the other power levels. Even though the higher the power level is, the more neighbors each node has, the variance in the number of neighbors remains high for all considered power levels. Overall, the testbed fulfills the goal of highly nonuniform neighborhood sizes. Fig. 17. Neighbor distribution for different radio power 3.5 Link asymmetry The last design goal of our testbed were numerous asymmetric links. Such links are particularly challenging for routing protocols. First, a node may classify a link as a highquality one based solely on the incoming packet reception rate [1]. If the link is asymmetric, the node will not be able to reliably send any packet over it. Second, if in contrast the outgoing packet reception rate is high, but the incoming one is low, a protocol that requires hop-by-hop acknowledgments for packet forwarding will not be able to utilize the link. To analyze the properties of asymmetric links, we compare all A-grade unidirectional links with their corresponding reverse links. Asymmetric links are then classified based on the relative difference between their reception rates in both directions into the following three categories: A 35, A 65 and A 95 (see Table 3). The fractions of links in each of these

10 1 M. Michalowski et al. Fig. 16. Link asymmetry map (7dBm) asymmetry categories are presented in Fig. 18. Grade Asymmetry level A 35 (35%, 65%] A 65 (65%, 95%] A 95 (95%, 1%] Table 3. Link asymmetry categories For the radio output power levels of dbm and 1dBm, all asymmetry categories cover a similar fraction of A-grade links. This results in the overall fraction of asymmetric links of 15% and 2%, respectively. However, for the remaining power levels, a large number of links are classified in the A 95 asymmetry category. As an example, 15% of A-grade links at the 5dBm output power correspond to reverse links with the reception rate lower than.5. This means that if a link is asymmetric, the extent of this asymmetry is very large with a high probability. Fraction of A-grade links [%] Power level [dbm] Fig. 18. Asymmetry of A-grade links A 35 A 65 A 95 Figure 16 shows which nodes have asymmetric links. In the figure, each node pair with an asymmetric link is connected by an arrow, which indicates the direction of the high-quality link. The darker is the arrow, the more significant the asymmetry it illustrates. The figure suggest that asymmetric links usually connect distant nodes. In particular, at the power level of 7dBm almost all such links connect different rooms. To sum up, for any power level at least 15% of links are asymmetric, and, moreover, the extent of the asymmetry is high. In other words, the testbed fulfills also our last design goal. 4 Collection Routing In addition to the previous microbenchmarks, we present experiments with a complete routing protocol in order to illustrate how such a protocol can perform on the testbed. To this end, we employ the well-known Collection Tree Protocol (CTP) [3]. CTP is an all-to-one routing protocol: all packets from the network are routed to a single or at most a few sink nodes. To perform routing, CTP maintains a spanning tree rooted at the sink node. Each node simply forwards all incoming packets to its parent node in the tree. To construct and maintain the tree, in turn, each node periodically broadcasts a so-called beacon packet. In this way, based on the received beacon packets, every node can select its parent in the tree. The details can be found in the original description of CTP [3]. 4.1 Experimental settings CTP is utilized, among others, by the TestNetwork application, which belongs to the standard TinyOS 2.1 distribution. Each node programmed with the TestNetwork application periodically creates a packet, which is subsequently routed by the network to the closest sink. When the packet is received by the sink node, it is forwarded to a PC to which the sink node is attached over the USB interface. We ran the TestNetwork application with three different single-sink configurations, which are marked as L, M, and R in Fig. 19. During the experiments we experienced a long-lasting failure of the testbed infrastructure in room 44. Six nodes that did not take part in the experiment are

11 A Sensornet Testbed at the University of Warsaw 11 Fig. 19. Sink node layout in CTP experiments Parameter Used by Description Values used Packet interval TestNetwork The interval between packets sent by a node is selected randomly. 5min This parameter limits the maximal value of the interval. Its value prevents the network from overloading a sink node and minimizes packet collisions. Sink nodes TestNetwork The identifier of the sink node. We used one sink per experiment. L, M, R Number of retransmissions CTP The maximal number of retransmissions of a packet performed 3 by a node at each hop. After exceeding this value, the node drops the packet. White bit function CTP This function indicates a physical channel quality and is used by RSSI 8 CTP s Four-Bit Wireless Link Estimator [1]. For each received packet, the function returns the estimator s white bit. A set white bit implies that during the reception, the quality of the signal is high. Max neighborhood size CTP CTP (actually the Four-Bit Wireless Link Estimator) maintains 1 a list of neighbors from which an alternative parent may be chosen. The size of this list is limited by this parameter. Radio output power G-Node The strength of the outgoing radio signal of each node. 5dBm Table 4. CTP experimental settings Test Sink Undelivered Hops Cost UP PCR Beacons T L L % % 84.5% T M M % % 6.7% T R R 1.1% % 6.6% Table 5. CTP performance summary marked with white circles in Fig. 19. Table 4 describes the parameters used in the tests. The parameters have mostly default values. 4.2 Experimental metrics We are interested in the standard CTP metrics: Fraction of undelivered packets The fraction of packets created by the test application that are undelivered to the sink. Hop count The average number of hops required to deliver a packet to the sink. Cost The number of transmissions for each delivered packet. Ideally, this value should be equal to the number of hops the packet travels. However, retransmissions may occur during the delivery of the packet. Unique parents per node (UP) The average number of unique parents that a node has during a test. Parent change rate (PCR) This value indicates how large the number of parent changes is compared to the number of packets created by a node. Beaconing rate

12 12 M. Michalowski et al. Beacon rate compares the number of beacons broadcast by CTP to maintain the routing tree to the number of data packets created by the TestNetwork application. For each test, all the metrics are calculated based on experimental data collected at least 1h after the start of the test. Such a delay is enough for CTP to fully bootstrap a stable routing tree. 4.3 Experimental results Table 5 summarizes the values of these metrics in the conducted experiments. Let us start with the packet delivery rates. For both L and M sink nodes, CTP offers almost 1% packet delivery. On the routes to sink node R, in turn, approximately 1% of packets are dropped. The higher value for node R is likely due to longer routing paths (see below). Essentially, the longer a routing path is, the more places something may go wrong with the packet, and thus, the higher the chance that the packet will not be delivered to the sink. The lengths of routing paths are correlated closely with the placement of a sink node in the network. Sink nodes at the edges of the network or in sparser areas require longer routing paths. More specifically, for sink node M, which is in the center of the network, only 2.34 routing hops are required on average. Node L, which is at the edge, but also in a dense region, requires 4.75 hops on average. Finally, node R which is not only at the edge, but also in a sparse area, is the most demanding in terms of routing: it requires 7.23 hops on average. The cost of packet delivery is relatively low in all cases, as approximately only 5% of packet transmissions are repeated. This indicates that CTP is effective in identifying high-quality links. When it comes to the stability of the routing topology, sink node L offers the least stable tree in terms of the parent change rate. With this node as the sink, a node has 4.17 unique parents on average, whereas for the other sink nodes, the number of unique parents is close to 1. The large number of unique parents is best explained by comparing Fig. 2 and Fig. 21, which present the links used by CTP for sink node L and sink node M, respectively. The darker is the line, the more packets are transferred over the corresponding link. For sink node L, in room 42, there are a lot of light-gray links, which indicates a large number of unique parents. In general, the more equally good (i.e., equally distant from the sink) parent candidates a node has, the more likely the node is to change its parent, which is exactly the case for room 42 in Fig. 2. Finally, the parent change rate of a node is related to the number of unique parents the node has. For the least stable topology, the one with sink node L, the average parent change rate is only 2.9%. This means that CTP does not waste a lot of traffic into reorganizing its routing topology. To sum up, despite the challenging properties of the testbed, CTP performs well. It is thus a good starting point for research on routing. There are, however, some areas, such as parent changes, exploring which can potentially lead to new improvements of routing algorithms. 5 Conclusion We presented our testbed, designed specifically for experimenting with routing protocols. The testbed consists of 1+-sensor nodes dispersed across ten office rooms and supported by additional infrastructure. As we demonstrated with microbenchmarks and experiments CTP, the testbed constitutes a challenging environment for routing protocols. First, it has a large diameter: from six to nine hops, depending on the radio output power. Second, it offers a highly nonuniform node density: from a few to nearly fifty neighbors. Third, it exhibits a large fraction of asymmetric links. We thus believe that the testbed will be an important experimental environment in our future research activities. Acknowledgment The research presented in this report as well as the hardware for the testbed were supported by the Foundation for Polish Science under grant HOMING PLUS/21-2/4, cofinanced from the Regional Development Fund of the European Union within the Innovative Economy Operational Program, and a START scholarship (K. Iwanicki). References [1] FONSECA, R., GNAWALI, O., JAMIESON, K., AND LEVIS, P. Four-Bit Wireless Link Estimation. In Sixth Workshop on Hot Topics in Networks (HotNets) (Nov. 27). [2] GAY, D., LEVIS, P., VON BEHREN, R., WELSH, M., BREWER, E., AND CULLER, D. The nesc language: A holistic approach to networked embedded systems. SIGPLAN Not. 38, 5 (May 23), [3] GNAWALI, O., FONSECA, R., JAMIESON, K., MOSS, D., AND LEVIS, P. Collection Tree Protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys 9) (November 29). [4] IWANICKI, K., AND AZIM, T. Experimentally studying the sensornet point-to-point routing techniques spectrum. In INSS 1: Proceedings of the 7th IEEE International Conference on Networked Sensing Systems (Kassel, Germany, June 21), pp [5] IWANICKI, K., GABA, A., AND VAN STEEN, M. KonTest: A wireless sensor network testbed at Vrije Universiteit Amsterdam. Tech. Rep. IR-CS-45, Vrije Universiteit Amsterdam, Amsterdam, the Netherlands, August 28. [6] IWANICKI, K., AND VAN STEEN, M. On hierarchical routing in wireless sensor networks. In IPSN 9: Proceedings of the 8th ACM/IEEE International Conference on Information Processing in Sensor Networks, IP Track (San Francisco, CA, USA, April 29), pp [7] LEVIS, P., MADDEN, S., POLASTRE, J., SZEWCZYK, R., WHITE- HOUSE, K., WOO, A., GAY, D., HILL, J., WELSH, M., BREWER, E., AND CULLER, D. TinyOS: An Operating System for Sensor

13 A Sensornet Testbed at the University of Warsaw 13 Fig. 2. Up-links used by CTP for sink node L Fig. 21. Up-links used by CTP for sink node M Networks Ambient Intelligence. In Ambient Intelligence, W. Weber, J. M. Rabaey, and E. Aarts, Eds. Springer Berlin Heidelberg, Berlin/Heidelberg, 25, ch. 7, pp [8] MICHALOWSKI, M. An experimental platform for wireless sensor networks. Master s thesis, University of Warsaw, June 212. [9] SOWNET TECHNOLOGIES B.V. G-Node G31. sownet.nl/download/g31web.pdf. [1] SRINIVASAN, K., AND LEVIS, P. RSSI is under appreciated. In EmNets 6: Proceedings of the 3rd Workshop on Embedded Networked Sensors (Cambridge, MA, USA, 26).

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a

More information

Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks

Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks Tao Liu, Ankur Kamthe, Lun Jiang and Alberto Cerpa Computer Science and Engineering, University of

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Topology and Power Control

Topology and Power Control Topology and Power Control Octav Chipara Motivation Energy and capacity are limited resources in wireless sensor networks Answer: Topology and Power Control maintain a topology with certain properties

More information

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive

More information

Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors

Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors Exploiting On-Chip Data Transfers for Improving Performance of Chip-Scale Multiprocessors G. Chen 1, M. Kandemir 1, I. Kolcu 2, and A. Choudhary 3 1 Pennsylvania State University, PA 16802, USA 2 UMIST,

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,

More information

Starburst SSD: An Efficient Protocol for Selective Dissemination

Starburst SSD: An Efficient Protocol for Selective Dissemination Starburst SSD: An Efficient Protocol for Selective Dissemination Tahir Azim Stanford University Stanford, California 9435 Email:tazim@cs.stanford.edu Qasim Mansoor National University of Sciences and Technology

More information

Characterization of Wireless Networks in the Home

Characterization of Wireless Networks in the Home Characterization of 802.11 Wireless Networks in the Home BY MARK YARBIS, KONSTANTINA PAPAGIANNAKI, AND W. STEVEN CONNER PRESENTED BY CHUNG TRAN CS 577 Table of contents 2 Introduction Experimental Environment

More information

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Rachel Cardell-Oliver School of Computer Science & So8ware Engineering semester-2 2018 MoBvaBon Holes cause WSN to fail its role Holes can

More information

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study The Computer Journal Advance Access published July 21, 2013 The British Computer Society 2013. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxt074

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Characterization of Wireless Networks in the Home

Characterization of Wireless Networks in the Home Characterization of 82. Wireless Networks in the Home Mark Yarvis; Dina Papagiannaki; Steven Conner IRC-TR-5-35 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

WP-PD Wirepas Mesh Overview

WP-PD Wirepas Mesh Overview WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David obinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,

More information

Available online at ScienceDirect. Procedia Engineering 154 (2016 )

Available online at  ScienceDirect. Procedia Engineering 154 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 154 (2016 ) 223 228 12th International Conference on Hydroinformatics, HIC 2016 An Improved Method of Avoiding RF Congestion

More information

WT-4000 Wireless System

WT-4000 Wireless System WT-4000 Wireless System Best Practices WT-BAC-IP Code No. LIT-12012551 Issued July 2017 Background and Wireless Network Components Refer to the QuickLIT website for the most up-to-date version of this

More information

Routing for IoT and Sensor Systems

Routing for IoT and Sensor Systems Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)

More information

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

Experimental Extensions to RSVP Remote Client and One-Pass Signalling 1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de

More information

On Hierarchical Routing in Wireless Sensor Networks

On Hierarchical Routing in Wireless Sensor Networks On Hierarchical Routing in Wireless Sensor Networks Konrad Iwanicki Department of Computer Science Vrije Universiteit Amsterdam, The Netherlands iwanicki@few.vu.nl Maarten van Steen Department of Computer

More information

An Evaluation of Shared Multicast Trees with Multiple Active Cores

An Evaluation of Shared Multicast Trees with Multiple Active Cores Brigham Young University BYU ScholarsArchive All Faculty Publications 2001-07-01 An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala daniel_zappala@byu.edu Aaron Fabbri Follow

More information

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants Florian Kauer, Florian Meyer, Volker Turau June 13 th, 2017 Institute of Telematics Hamburg University of Technology

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x

Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Dhaval Patel, 1 Bijal Chawla, 2 Chandresh Parekh 3 12 PG Student, Department of Wireless Mobile Computing, Gujarat

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Robust Topology Control for Indoor Wireless Sensor Networks

Robust Topology Control for Indoor Wireless Sensor Networks Robust Topology Control for Indoor Wireless Sensor Networks Gregory Hackmann, Octav Chipara, Chenyang Lu Department of Computer Science and Engineering Washington University in St. Louis, USA {gwh2, ochipara,

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Towards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007

Towards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Towards a Wireless Lexicon Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Low Power Wireless Low cost, numerous devices Wireless sensornets Personal area networks (PANs) Ad-hoc networks

More information

MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks

MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks : A Multi-Channel MAC Protocol for Wireless Sensor Networks Özlem Durmaz Incel, Pierre Jansen, Sape Mullender University of Twente Department of Computer Science Enschede, The Netherlands {durmazo, jansen,

More information

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing?

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? J. Flich 1,P.López 1, M. P. Malumbres 1, J. Duato 1, and T. Rokicki 2 1 Dpto. Informática

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

File Size Distribution on UNIX Systems Then and Now

File Size Distribution on UNIX Systems Then and Now File Size Distribution on UNIX Systems Then and Now Andrew S. Tanenbaum, Jorrit N. Herder*, Herbert Bos Dept. of Computer Science Vrije Universiteit Amsterdam, The Netherlands {ast@cs.vu.nl, jnherder@cs.vu.nl,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Critique #2. Ø Due on 2/13 (Tuesday)

Critique #2. Ø Due on 2/13 (Tuesday) Critique #2 Ø M. Sha, G. Hackmann and C. Lu, Real-world Empirical Studies on Multi- Channel Reliability and Spectrum Usage for Home-Area Sensor Networks, IEEE Transactions on Network and Service Management,

More information

THE IEEE standard was created in 2003, and its

THE IEEE standard was created in 2003, and its ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 1, NO. 2, NOVEMBER 2010 7 Simulation Study of the IEEE 802.15.4 Standard Low Rate Wireless Personal Area Networks Dariusz Kościelnik and Jacek Stępień

More information

New RF Models of the TinyOS Simulator for IEEE Standard

New RF Models of the TinyOS Simulator for IEEE Standard New RF Models of the TinyOS Simulator for IEEE 82.15.4 Standard Changsu Suh, Jung-Eun Joung and Young-Bae Ko R & D Departments, Hanback Electronics Company, Daejeon, Republic of Korea College of Information

More information

BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS

BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS XIX IMEKO World Congress Fundamental and Applied Metrology September 6!11, 2009, Lisbon, Portugal BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS L. Skrzypczak 1),

More information

Experimental Node Failure Analysis in WSNs

Experimental Node Failure Analysis in WSNs Experimental Node Failure Analysis in WSNs Jozef Kenyeres 1.2, Martin Kenyeres 2, Markus Rupp 1 1) Vienna University of Technology, Institute of Communications, Vienna, Austria 2) Slovak University of

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview Experiences with Implementing a Distributed and Self-Organizing Scheduling Algorithm for Energy-Efficient Data Gathering on a Real-Life Sensor Network Platform Yang Zhang, Supriyo Chatterjea, Paul Havinga

More information

A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks

A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University of North Carolina at Charlotte, Charlotte, NC

More information

Improving Link Quality by Exploiting Channel Diversity in Wireless Sensor Networks

Improving Link Quality by Exploiting Channel Diversity in Wireless Sensor Networks Improving Link Quality by Exploiting Channel Diversity in Wireless Sensor Networks Manjunath Doddavenkatappa, Mun Choon Chan and Ben Leong School of Computing, National University of Singapore Email:{doddaven,chanmc,benleong}@comp.nus.edu.sg

More information

An Active Tracking System Using IEEE Based Ultrasonic Sensor Devices

An Active Tracking System Using IEEE Based Ultrasonic Sensor Devices An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices Shinyoung Yi and Hojung Cha Department of Computer Science, Yonsei University Seodaemun-gu, Shinchon-dong 134, Seoul 120-749,

More information

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001 Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which

More information

Revisiting Gossip-based Ad-Hoc Routing

Revisiting Gossip-based Ad-Hoc Routing Revisiting Gossip-based Ad-Hoc Routing Albana Gaba, Spyros Voulgaris, Konrad Iwanicki and Maarten van Steen Dept. of Computer Science, VU University Amsterdam, The Netherlands Email: {agaba,spyros,steen}@cs.vu.nl

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Performance of an IPv6 Web Server under Congestion

Performance of an IPv6 Web Server under Congestion Performance of an IPv6 Web Server under Congestion A. Loukili, A. K. Tsetse, A. L. Wijesinha, R. K. Karne, and P. Appiah-Kubi Department of Computer & Information Sciences Towson University Towson, MD

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

Available online at ScienceDirect. Procedia Computer Science 87 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 87 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 87 (2016 ) 270 274 4th International Conference on Recent Trends in Computer Science & Engineering Analysis of Routing

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Analysis of WLAN Traffic in the Wild

Analysis of WLAN Traffic in the Wild Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze

More information

Chapter 3 : Topology basics

Chapter 3 : Topology basics 1 Chapter 3 : Topology basics What is the network topology Nomenclature Traffic pattern Performance Packaging cost Case study: the SGI Origin 2000 2 Network topology (1) It corresponds to the static arrangement

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Reliable Routing Algorithm on Wireless Sensor Network

Reliable Routing Algorithm on Wireless Sensor Network International Journal of Engineering & Computer Science IJECS-IJENS Vol:12 No:06 26 Reliable Routing Algorithm on Wireless Sensor Network Jun-jun Liang 1, Zhen-Wu Yuna 1, Jian-Jun Lei 1 and Gu-In Kwon

More information

Architecture and Evaluation of an Unplanned b Mesh Network

Architecture and Evaluation of an Unplanned b Mesh Network Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks By Byron E. Thornton Objective We now begin to build a Wireless Sensor Network model that better captures the operational

More information

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

Performance Evaluation of RPL Objective Functions

Performance Evaluation of RPL Objective Functions See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/281377239 Performance Evaluation of RPL Objective Functions CONFERENCE PAPER OCTOBER 2015 READS

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Mathias Becquaert, Bart Scheers, Ben Lauwens Royal Military Academy Department CISS Renaissancelaan 30 B1000 Brussels, Belgium E-mail: mathias.becquaert@mil.be,

More information

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks Abstract A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Empirical Analysis of the Hidden Terminal Problem in Wireless Underground Sensor Networks

Empirical Analysis of the Hidden Terminal Problem in Wireless Underground Sensor Networks Empirical Analysis of the Hidden Terminal Problem in Wireless Underground Sensor Networks Xin Dong, Mehmet C. Vuran Cyber-Physical Networking Laboratory Department of Computer Science & Engineering University

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information